On energy security of smartphones

4Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.

Abstract

The availability of smartphones is still severely restricted by the limited battery lifetime. To help users understand the energy consumption, major mobile platforms support fine-grained energy profiling for each app. In this paper, we present a new threat, called energy collateral attacks, which can abuse and mislead all existing energy modeling approaches. In particular, energy collateral attacks are able to divulge battery stealthily through interprocess communication, wakelock, and screen. To defend against those attacks, we propose E-Android to accurately profile the energy consumption in a comprehensive manner. E-Android monitors energy collateral related events and maintains energy consumption for relevant apps. We utilize E-Android to measure the energy consumption under the attack of six energy malware and two normal scenarios. While Android fails to disclose all these energy-malware-based attacks, EAndroid can accurately profile energy consumption and reveal the existence of energy malware.

Cite

CITATION STYLE

APA

Gao, X., Liu, D., Liu, D., & Wang, H. (2016). On energy security of smartphones. In CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy (pp. 148–150). Association for Computing Machinery, Inc. https://doi.org/10.1145/2857705.2857738

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free